Professional Documents
Culture Documents
Alcatel 1350NM
Network Management
Alcatel 1320CT
Craft Terminal
AS Rel.6.5
Alarm Surveillance
01
040126
ED
DATE
2 / 182
CHANGE NOTE
E.MIGNON L.FORESTA
M.SHABOU C.FAVERO
APPRAISAL AUTHORITY
ORIGINATOR
Contents
Contents
-1
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
-1.1
22
24
25
27
29
29
29
30
34
39
40
Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
41
-1.2
-1.3
-2
-2.1
-2.2
-2.3
-1.1.1
-1.1.2
-1.1.3
-1.1.4
-1.1.5
15
15
16
18
20
22
41
41
42
42
43
43
44
45
45
45
46
46
47
47
3 / 182
Contents
-2.3.2
-2.3.3
-3
47
48
49
-3.1
-3.2
-3.3
-4
Sublist Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-4.1
57
58
60
61
65
68
78
83
85
91
93
98
99
100
101
102
102
104
105
Alarm Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
107
-4.3
-4.4
-4.5
-4.6
-4.7
-5.1
-5.2
-5.3
-5.4
-5.5
-5.6
4 / 182
50
50
51
53
53
54
55
Creating a Sublist . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Modifying a Sublist . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-4.2.1
Display Panel . . . . . . . . . . . . . . . . . . . . . . .
-4.2.2
Filter Panel . . . . . . . . . . . . . . . . . . . . . . . . . .
-4.2.3
Basic Sub-panel . . . . . . . . . . . . . . . . . . . .
-4.2.4
Source Sub-panel . . . . . . . . . . . . . . . . . . .
-4.2.5
Extended Sub-panel . . . . . . . . . . . . . . . . .
-4.2.6
Advanced Sub-panel . . . . . . . . . . . . . . . .
-4.2.7
Sort Panel . . . . . . . . . . . . . . . . . . . . . . . . . .
-4.2.8
Trigger Panel . . . . . . . . . . . . . . . . . . . . . . . .
Deleting a Sublist . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Activating/Deactivating a Sublist . . . . . . . . . . . . . . . . .
Enabling/Disabling a Counter . . . . . . . . . . . . . . . . . .
Visualizing (Opening) a Sublist . . . . . . . . . . . . . . . . . .
-4.6.1
Menu Bar . . . . . . . . . . . . . . . . . . . . . . . . . .
-4.6.2
Alarm Table . . . . . . . . . . . . . . . . . . . . . . . . .
-4.6.3
Indicator Fields . . . . . . . . . . . . . . . . . . . . . .
Exiting Alarm Surveillance . . . . . . . . . . . . . . . . . . . . . .
-4.2
-5
Current Alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Menu Bar . . . . . . . . . . . . . . . . . . . . . . . . . .
Sublist Table . . . . . . . . . . . . . . . . . . . . . . . .
Historical Alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-3.2.1
Menu Bar . . . . . . . . . . . . . . . . . . . . . . . . . .
-3.2.2
Sublist Table . . . . . . . . . . . . . . . . . . . . . . . .
Setting the Display of the Counter Summary Window
-3.1.1
-3.1.2
Selecting an alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting All the Alarms . . . . . . . . . . . . . .
Selecting a Single or a Group of Alarms
Reserving/Unreserving Alarms . . . . . . . . . . . . . . . . . .
-5.2.1
Reserving Alarms . . . . . . . . . . . . . . . . . . . .
-5.2.2
Unreserving Alarms . . . . . . . . . . . . . . . . . .
Creating a Trouble Ticket . . . . . . . . . . . . . . . . . . . . . . .
Acknowledging Alarms . . . . . . . . . . . . . . . . . . . . . . . .
Manually Purging an Alarm . . . . . . . . . . . . . . . . . . . .
Manually Clearing an Alarm . . . . . . . . . . . . . . . . . . . .
-5.1.1
-5.1.2
108
108
108
109
109
109
110
111
112
113
Contents
-5.7
115
118
Display Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
121
-5.8
-6
-6.1
122
123
124
125
126
127
129
-6.2
-6.3
-6.4
-6.5
-7
-7.1
130
131
137
138
138
139
140
141
143
143
144
145
146
146
147
147
149
151
151
152
154
155
156
156
157
-7.2
-7.3
-7.4
-8
-8.1
159
164
165
Navigation Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
167
-8.3
-9.1
-7.1.1
-7.1.2
-7.1.3
-7.1.4
-7.1.5
-8.2
-9
-6.1.1
168
5 / 182
Contents
-9.2
169
170
174
174
174
175
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
177
-9.3
-9.4
-9.5
-10
-10.1
-10.2
6 / 182
Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
176
177
178
Contents
Figures
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Figure
Figure
Figure
Figure
Figure
Figure
29
30
31
32
33
34
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
35
36
37
38
39
40
41
42
16
18
23
26
28
31
32
34
36
36
38
40
50
53
55
56
57
58
59
61
62
63
65
68
69
70
70
72
73
74
75
76
76
77
78
79
81
82
83
85
86
86
7 / 182
Contents
8 / 182
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
43
44
45
46
47
48
49
50
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
87
88
89
90
91
93
94
97
98
101
103
105
105
107
113
114
115
116
118
119
121
122
123
129
131
132
133
135
137
140
140
141
142
144
145
146
147
147
148
150
150
152
154
155
156
Contents
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
88
89
90
91
92
93
94
95
96
97
158
160
161
162
163
163
164
167
170
171
9 / 182
Contents
Tables
Table 1
Table 2
10 / 182
Preface
Preface
History as internal document 3BP 21662 0012 TCZZA
Ed 01 on 02-11-18
creation for AS 6.5.0
Ed 02 on 03-09-30
Update for AS 6.5.1 P2
Legal Notice
Document Scope
Edition Scope
Target Audience
11 / 182
Preface
Document Structure
1. Overview
Presents the Alarm Surveillance application, its functionalities
and the context it takes place into, together with the user
interface principles.
"
2. Getting Started
Describes how to quickly use the main features of AS.
"
"
4. Sublist Management
Explains how to manage the current or historical alarm
sublists and presents the general operations on sublists and
on alarms within their sublist properties.
"
5. Alarm Management
Presents the main actions to manage the alarms in the alarm
sublist window and explains how to save an historical alarm. It
explains also how to manage the Alarm Synthesis Information
symbols.
"
6. Display Management
Explains how to choose the way to display the alarm
information from the alarm sublist.
"
"
"
9. Navigation Features
Describes the navigation within the AS application and toward
external applications.
"
10. Terminology
Gives a list of abbreviations and the definitions of terms used
in this document.
12 / 182
Preface
Related Documents
"
Reference Documents
"
"
"
"
"
"
"
13 / 182
Preface
14 / 182
1 Overview
1 Overview
1.1
1.1.1
15 / 182
1 Overview
NETWORK
Network User
Network User
available
resource
faulty
resource
Figure 1
1.1.2
resource
emitting
alarms
Alarm Information
Alarms or Alarm notifications consist in messages emitted by
network resources that have detected problems or failures in the
network. Information contained in the alarm belongs to two
classes:
"
"
Resource Identification
16 / 182
Resource identification
Type identification.
"
1 Overview
Type Identification
Identifies the type of the problem the alarm refers to. The kind of
problem regroups three basic elements of information:
"
The problem type (Event type) taken out of the five following
ones:
D
D
D
D
D
Note
Quality of service
Communications
Processing error
Equipment
Environmental.
"
"
Major
Minor
17 / 182
1 Overview
1.1.3
AS Functionalities
The AS application is dedicated to receive, store, display and
manage in real time alarms raised by different sources, here
called current alarms, facilitating the overall alarm surveillance of
the multi-vendor and multi-technology network, and improving
the reaction time of the network users in case of anomalies in the
network. It also provides the possibility to archive and retrieve the
alarms, then called historical alarms, allowing post-analysis of
anomalies in the network.
Figure 2 illustrates the use of the different branches of the Alarm
Surveillance application.
Real-Time Management
Static Analysis
AS User
AS User
print/export
alarms
print/export
alarms
Printer
Printer
Export Files
Export Files
display
alarms
CURRENT
ALARMS
display
alarms
manage
alarms
archive
alarms
ARCHIVED
ALARMS
Alarm
Surveillance
NETWORK
RESOURCES
Figure 2
18 / 182
1 Overview
Note
19 / 182
1 Overview
1.1.4
Raised Alarm
Displayed Alarm
"
"
"
"
20 / 182
1 Overview
Cleared Alarm
Note
Note that a single anomaly in the network may cause the raising
of several alarms; it may also generate other anomalies or
disfunctioning that raise additional alarms. These alarms, called
correlated alarms, may be marked as linked to each other. The
user can be aware if an alarm has correlated alarms or not.
21 / 182
1 Overview
1.1.5
1.1.6
22 / 182
1 Overview
Alarm
s
Counter
Summary
Alarm Sublist
More Alarm
Information
sort
filter
increasing precision
actual network
global vision
1 summary,
n sublists
Figure 3
local vision
1 sublist,
n alarms
detailed vision
1 alarm
23 / 182
1 Overview
1.1.7
"
24 / 182
1 Overview
1.1.8
Historical alarms are not available with 1320 Craft Terminal. They
are only operative with Network Management.
AS historical part allows to display archived alarms and to perform
actions on them. AS internally manages an archiving space called
the Historical Alarm List (HAL) containing former current alarms
that have been archived through one of the following processes
(at the additional condition they were matching the archiving
filter):
"
"
"
"
"
"
"
Specifying filters, you can extract alarms from this archiving space
to visualize and process them.
The HAL is stored using a specific ad-hoc format, referenced
below as the Public Archive format. This repository receives all
alarms matching through the Archiving filter.
The content of this repository, as a list of alarms, is usually
identical over a short time period. The repository can be seen as a
redundancy method to improve the availability of the archiving
and retrieval functions of the AS application.
The application allows to retrieve archived alarms from several
public archive (local and external). By using a filter, called the
25 / 182
1 Overview
Figure 4
26 / 182
1 Overview
1.1.9
AS Advanced Features
Because the Current Alarm List (CAL) has a limited size, the user is
provided with several advanced features in order to solve capacity
overflow problems:
"
The user can adjust the CAL size, and indicates the filling
percentage starting from which a warning is emitted (see
paragraph 7.1.1). The maximum size value being itself
limited to a maximum value of 10000 current alarms. The
user can also specify the behavior of the CAL when the
overflow occurs (wrap/halt). In wrap mode, a mechanism of
purge will be automatically involved. The user specifies the
size of the purge (number of alarms) and the criteria to select
the alarms to be eliminated (these alarms are archived in the
historical list).
"
"
"
"
"
27 / 182
1 Overview
"
"
Static Analysis
navigation
AS User
AS User
navigation
EXTERNAL
APPLICATION
navigation
sublist
ordering
and filtering
auto-beeping
auto-trouble
ticket creation
ARS
archiving
filter
sublist
ordering and
filtering
alarm retrieving
overflow purge
CURRENT
ALARMS
ARCHIVED
ALARMS
auto-acknowledgement filter
auto-purge filter
Alarm flow
Alarm ordering
Alarm filtering
NETWORK
RESOURCES
Figure 5
28 / 182
1 Overview
1.2
1.2.1
HMI Overview
This section gives some general rules concerning the whole AS
user interface. It includes a general description of the different
kinds of windows that can be encountered through the
application.
Current and historical part of the Alarm Surveillance follow the
same design rules. This allows the user to use indifferently both
parts without any additional formation. These design rules aim to
get an interface that is:
"
"
"
Simple Interface
Interactive Interface
Personal Interface
1.2.2
Simple
Interactive
Personal.
29 / 182
1 Overview
1.2.3
The menu bar, when it exists, is located at the top of the window,
just below the title.
A right arrow, when appearing at the right of a menu item,
indicates the presence of a popup sub-menu.
The ... mention, at the right of a menu item or of a button label
(for example Create...), means that additional information is
needed to perform the operation. This information will be
provided through a dialog box.
When a character appears underlined inside a menu item or a
button label, the combination of the Alt key and of the character
key provides a shortcut for executing the same command.
A grayed item means that the corresponding command is not
available, either because of a restriction of access rights, or
because the operation needs an operand, which has not yet been
selected.
30 / 182
1 Overview
Buttons
push button (or button)
check button (or checkbox)
radio button
"
"
"
"
31 / 182
1 Overview
Boxes
twin boxes
entry box
combo box
spin buttons
Figure 7
32 / 182
1 Overview
"
The list box, or more simply the list, is used to display sets of
generally non-predefined items and to select the item (simple
selection list ) or the items (multiple selection list) on which an
action will be performed.
"
The twin boxes are used to select and move one or several
attributes from a source list to a destination list:
The user can move one or several attributes from a source list
(e.g. Hidden Attributes list) to the destination list (e.g.
Displayed Attributes) by selecting the desired items and then
using the arrow buttons (left and right).
In each list multiple selection is available. To add a new
attribute to the selection, press the Ctrl key simultaneously to
the mouse click. To unselect an already selected attribute, use
again in the same way this Ctrl key. To add a whole block of
attributes, including all items between the end of the current
selection and the designated item, press the Shift key
together with the mouse button, or hold the button across the
desired block.
To control the position of insertion in the destination list, after
the selection of the desired item in the source list, operate as
follows:
"
"
33 / 182
1 Overview
1.2.4
Windows
The user interface is built with three kinds of windows:
"
"
"
Main Windows
Main windows
Additional windows
Dialog boxes
Main windows are primary windows. The user does not need to
close them before performing any other action. A possible
presentation of main windows is shown in figure 8.
WINDOW TITLE
MENU BAR
WORKING AREA
INFORMATION BOX
Figure 8
34 / 182
1 Overview
"
"
35 / 182
1 Overview
Additional Windows
Window Title
Folder
Working area(s)
Reset
Apply
Figure 9
Close
Help
Button area
Selection
Tree area
Apply
Figure 10
36 / 182
Working
area(s)
Reset
Close
Help
Button area
"
"
"
1 Overview
"
37 / 182
1 Overview
Dialog Boxes
Figure 11
Cancel
Help
Button area
The central area is read-only. The user can perform any action
on it.
For a simple information or error message, the button bar will
only include a Ok button to acknowledge the message.
For a confirmation, the button bar will include Ok and Cancel,
and sometimes Help.
Output, Tone Configuration and basic dialog windows belong to
this category of windows. Their functionalities are described in
detail later on.
38 / 182
1 Overview
1.2.5
On-line Help
An on-line help is provided by the application. The user can
access this help:
"
"
by opening the Help popup menu from the menu bar in any
workspace window, and then selecting one of the following
options:
D
39 / 182
1 Overview
1.3
HAL
(Sublist / Modify)
MAIN FILTER
PUBLIC ARCHIVE
USER SOURCE FILE
RETRIEVE
SUBLIST
PROPERTIES
(Display)
COLOR
CHOOSER
(Sublist / Modify)
(Action / Output)
(Sublist / Open)
COUNTER
SUMMARY
(Navigation / Sublist)
OUTPUT
ALARM
SUBLIST
HAL
FILE
CHOOSER
MORE ALARM
INFORMATION
CAL
(Navigation / Report)
REPORT
(Option / Administration)
IM ADMINISTRATION
CAL
CAL
CAL
Alarm Aging
Identification
TRIGGER LIST
Trigger
Identification
Map
Administration
(Navigation / Report)
REPORT
Figure 12
40 / 182
2 Getting Started
2 Getting Started
This chapter allows you to quickly use the main features of AS, by
means of instructions in form of procedures.
To get more information about windows, dialog boxes and menus
as those mentioned in these procedures, refer to chapter 3 to 9.
These procedures are organized into three parts:
"
"
"
2.1
2.1.1
Opening a Sublist
Counter Summary only displays global information. To get more
information, it is necessary to open the sublist.
"
41 / 182
2 Getting Started
2.1.2
2.1.3
Reserving an Alarm
To ensure to be the only responsible for an alarm (or a group of
alarms), you can perform the reservation action on alarm(s).
"
"
42 / 182
2 Getting Started
2.1.4
"
2.1.5
Acknowledging an Alarm
To acknowledge a single or a group of selected alarms:
"
"
43 / 182
2 Getting Started
2.1.6
Clearing an Alarm
To manually clear one or several alarm(s):
"
"
"
In the Question dialog box that opens, click on the Yes push
button.
The Report window opens.
44 / 182
2 Getting Started
2.2
Historical alarms are not available with 1320 Craft Terminal. They
are only operative with Network Management.
The main procedures allowing you to manage the historical
alarms are as follows:
"
"
"
"
2.2.1
Opening a Sublist
"
2.2.2
45 / 182
2 Getting Started
2.2.3
"
2.2.4
"
46 / 182
2 Getting Started
2.3
2.3.1
2.3.2
47 / 182
2 Getting Started
2.3.3
48 / 182
49 / 182
3.1
Current Alarm
On start-up of AS current alarm management, the Counter
Summary window appears like in figure 13.
Figure 13
This window provides the user with all the available sublists
informing the user about the status of the network in term of
alarm.
3.1.1
Menu Bar
The menu bar includes the following pull-down menus:
50 / 182
"
"
"
"
"
3.1.2
Sublist Table
The sublists are updated according to the flow of incoming
alarms. When a new alarm arrives, filter matching is done for
each sublist. If the test is successful for a given sublist, the alarm is
added to this sublist, according to its displaying and sort criteria.
The default set of the sublist table is composed of:
Note
"
The Main Alarm List that contains all the available alarms. It
is a special sublist whose filtering properties cannot be
changed (filtering panel is insensitive).
"
"
"
The danger flag on the left of the sublist name, informs you
that new incoming alarms have appeared in the sublist (i.e.
no danger flag will appear in sublists which only contain
already present alarms, such as the cleared alarm sublist). If
the user selects (i.e. single click) or opens (i.e. double click)
the sublist, then this flag disappears (until new incoming
alarms are risen).
"
"
51 / 182
Table 1
Location
Action
Click
Double Click
Unselected
Select sublist
Single selection
Unselect sublist
Open the
SINGLE pointed
sublist
-
Column Titles
Sublist Line
(3)
row.
(3) Drag & Drop on the bottom or high edge of the 1.st column of any rows
resizes the height of all rows.
52 / 182
3.2
Historical Alarm
On start-up of AS historical alarm management, the Counter
Summary window appears like in figure 14:
Figure 14
3.2.1
Menu Bar
The menu bar includes the following pull-down menus:
"
"
"
"
"
53 / 182
3.2.2
Sublist Table
Before any action, this window only displays two empty lists in the
sublist table: the Main Alarm List and the Default Alarm
Sublist.
To initiate a work session:
54 / 182
"
"
3.3
Figure 15
Historical Alarm
Display
Inactive Sublists
Severity Counters
"
55 / 182
Figure 16
56 / 182
4 Sublist Management
4 Sublist Management
To manage the sublists in the Counter Summary window (see
chapter 3), click on the Sublist pull-down menu.
Depending on the context - current alarms (see section 3.1) or
historical alarms (see section 3.2) - the Sublist pull-down menu
is different (see figure 17).
Note
Current Alarm
Historical Alarm
Sublist
Sublist
Create
Modify...
Delete...
Activate
Deactivate
Open
Close
Save
Exit
Create
Modify...
Delete...
Enable Counter
Disable Counter
Open
Close
Save
Exit
Figure 17
"
"
"
"
"
"
"
Close a sublist
"
"
57 / 182
4 Sublist Management
4.1
Creating a Sublist
To set up a new sublist, you must define its characteristics, (i.e. its
filter, the list of attributes to display for the matching alarms, the
sort criteria to be applied, the color to be assigned). To ease this
process, you can create a sublist from an already existing sublist
(cloning mechanism) then change the parameters as needed.
To create a sublist:
"
Note
Figure 18
58 / 182
4 Sublist Management
Figure 19
59 / 182
4 Sublist Management
4.2
Modifying a Sublist
The following characteristics of a sublist can be modified:
Note
"
Name
"
Assigned color
"
"
"
"
"
"
"
"
60 / 182
4 Sublist Management
4.2.1
Display Panel
Figure 20
By using the Display panel (see figure 20), you can change:
"
"
"
Modifying the Sublist To modify the sublist name, click in the Sublist Name field and
Name replace the existing name. The size must be less than or equal to
32 characters.
61 / 182
4 Sublist Management
The sublist counter color is used to display the sublist line within
the sublist table of the Counter Summary window. For example, by
default, critical alarm sublist appears in red color.
To change this color, click on the large button labeled with the
sublist name.
The Color Chooser dialog box (figure 21 or figure 22) opens:
Figure 21
62 / 182
4 Sublist Management
Figure 22
In the left part, three slider bars with cursors allows the user to
precisely adjust the color.
Above these slider bars, an option button offers two color models:
"
"
63 / 182
4 Sublist Management
In the right part of the dialog box, according to the status of the
option button, a list of color names (see figure 21) or a palette of
color picture (see figure 22) is displayed:
"
"
Modifying the Attribute Displayed attributes are the alarm atrributes that appear in the
Display alarm table when the sublist is open (see section 4.6). The Display
panel (see figure 20) includes two lists:
"
"
64 / 182
The set of possible attributes depends on the context. The lists are
different in current alarms and historical alarms cases, but the
user interaction is identical.
4 Sublist Management
4.2.2
Filter Panel
The filter of a sublist is the criterion that determines the content of
the sublist. It is different from the display and sort criteria, that do
not affect this content.
The filter allows to store in a given sublist, alarms with common
properties (values of an attribute), matching some user defined
criteria. Filters can be saved for later use.
The Filter panel of the Sublist Properties window has the following
aspect (figure 23):
Figure 23
65 / 182
4 Sublist Management
The Filter Name group is placed at the top of the Filter panel (see
figure 23):
This group provides a list of filters previously prepared. In this
group, filters can be created, modified or removed. Clicking on
the drop down button shows the pull-down list containing the
existing filter names. Clicking on one of them selects it and loads
the various elementary criteria in the different other fields of the
panel.
The Not check button selection allows you to use or not this
attribute in the filter. If it is selected, the filter will consist in an NOT
condition on the global attributes.
Note
"
"
The NOT operator may be used (or not) for each individual
attribute_expr_i
For example, the following filter may be defined: severity = critical
AND NOT probable cause = fireDetected.
66 / 182
4 Sublist Management
The matching status area is between the Not check button and the
Save push button. It indicates if the alarms could match this filter.
One of the following three statuses may appear:
"
"
"
Match All: all alarms will match the filter. This means in
particular that a sublist characterized by this type of filter will
extract all alarms of the main list (in both current and
historical case).
To create a new filter in the Filter Name group, fill the field with
any authorized name. Authorized names are names containing
letters (case independent), numbers, and the three -, _, and .
characters. Size of a name should not exceed 32 characters.
Clicking on the Save push button will take into account every
element of the Filter Panel. Therefore this must be done after
having performed the modifications on the other elements of the
panel.
Note
Filter Sub-panels
67 / 182
4 Sublist Management
4.2.3
Basic Sub-panel
To activate or deactivate one of the groups (e.g. Severity or Alarm
Type), click the check button of the area (black color means that
the area has been activated). The following paragraphs detail the
operations for the different groups.
Figure 24
68 / 182
4 Sublist Management
Figure 25
Note
Historical alarms are not available with 1320 Craft Terminal. They
are only operative with Network Management.
69 / 182
4 Sublist Management
Figure 26
Figure 27
70 / 182
4 Sublist Management
"
"
Click on the Ok push button to close the dialog box and return to
the Basic sub-panel.
71 / 182
4 Sublist Management
Figure 28
The way of operation is exactly the same as for the Event Date &
Time Ranges group.
72 / 182
4 Sublist Management
Status Group
Reservation
Acknowledgement
Clearing
Clearable.
Figure 29
73 / 182
4 Sublist Management
Severity or Alarm Type In both contexts (current and historical alarms management),
Group alarms can also be filtered according to their severity level or their
type.
Figure 30
For each group, the test can be operated against several values,
offering an OR boolean user through multiple selection in the list.
Click on the Severity or Alarm Type check buttons to activate the
respective areas if they are not activated. Then, select the desired
fields with the left mouse button. Reciprocally, click also on the
check buttons to deactivate the areas if they are already activated
and you want to remove the corresponding condition from the
filter.
74 / 182
4 Sublist Management
Figure 31
75 / 182
4 Sublist Management
Figure 32
Correlation Group
Figure 33
76 / 182
4 Sublist Management
Only in the historical alarms case, you can extract alarms from the
Main Alarm List according to their insertion cause, i.e. the way the
alarm has entered the historical list.
This can be done by selecting the desired option in the Insertion
Cause area.
Figure 34
"
"
"
"
"
"
"
77 / 182
4 Sublist Management
4.2.4
Source Sub-panel
By using the source sub-panel (see figure 35), you can extract
alarms according to their MO class, MO instance or Friendly
Name (NE).
Figure 35
78 / 182
4 Sublist Management
Object Instance Type Radio buttons allow you to choose how the instance is managed
(as a Friendly Name or as a MO Instance).
Figure 36
"
"
79 / 182
4 Sublist Management
Enter the desired value in the lower edit field and then click
on the Add push button. The user's value appears now in the
right read-only area.
If you want to modify an existing value appearing in this
read-only list, select it first by clicking on it with the left
mouse button. This causes the left area to be put in conformity
with the selected element (this means that one of the Friendly
Name or MO Instance check buttons is checked, the option
button points to the option in accordance with the selected
element and the edit field is also updated). Bring any wanted
modifications in this area and valid them by clicking on the
Modify push button (note that this button remains disabled as
long as no element or more than one have been selected in
the right list box).
Multiple selection is available in the right list box to allow
removing action. To do this, select one or more elements in
the right list box and click on the initially disabled Remove
push button.
Moreover, it is also possible to use regular expressions, strings
of characters that define patterns used to search for matching.
It is a way of specifying a string that allows certain
metacharacters (e.g. '.', '*', '[', ']', '-', '+', '?') to stand for
other characters. Metacharacters in a regular expression are
defined as following:
80 / 182
4 Sublist Management
Object Class Type You can extract alarms with respect to multiple MO Class attribute
values.
Figure 37
81 / 182
4 Sublist Management
Figure 38
"
You can move one or several elements from a list to the other one
by selecting the desired items and then using the arrows buttons.
To retrieve valid values for MO Class, MO Instance and Friendly
Name, you can use the More Alarm Information window (see
section 6.1). This window can be called from any open sublist
window after selection of an alarm in the table. The three
attributes are displayed in the identity panel.
82 / 182
4 Sublist Management
4.2.5
Extended Sub-panel
By using the Extended sub-panel (see figure 39), you can extract
alarms considering their additional info attribute values.
Figure 39
Note
83 / 182
4 Sublist Management
84 / 182
4 Sublist Management
4.2.6
Advanced Sub-panel
By using the Advanced sub-panel (see figure 40), you can extract
alarms according to the name of their alarm source, their specific
problem attribute value, their Trouble Ticket and Repetition
Counter value and their expiration status.
Figure 40
85 / 182
4 Sublist Management
Figure 41
Figure 42
86 / 182
4 Sublist Management
"
The user can move one or several elements from a list to the other
one by selecting the desired items and then using the arrows
buttons.
Specific Problems
Group
Figure 43
87 / 182
4 Sublist Management
Figure 44
"
You can move one or several elements from a list to the other one
by selecting the desired items and then using the arrows buttons.
Before doing this, you have to choose the way the filter will be
applied, by using the option button located on the top middle of
the area. The proposed options allows you to perform all the
possible operations (Equal, Not Equal, SubSetOf, Not SubSetOf,
SuperSetOf, Not SuperSetOf, NullIntersection, Not
NullIntersection) between two data sets.
88 / 182
4 Sublist Management
Figure 45
"
"
The TT Ident check button becomes active. If you check it, you
can enter a TT identifier value in the corresponding field then
select an operation to apply to this value by clicking on the
relevant option button.
"
89 / 182
4 Sublist Management
Figure 46
Select a condition in the list. The option button allows to select the
way the filter will be applied on this condition. The proposed
options allow you to perform all the possible operations (Equal,
Not Equal, SubSetOf, Not SubSetOf, SuperSetOf, Not SuperSetOf,
NullIntersection, Not NullIntersection) between two data sets.
90 / 182
4 Sublist Management
4.2.7
Sort Panel
The Sort panel of the Sublist Properties window presents the
following aspect (figure 47):
Figure 47
91 / 182
4 Sublist Management
"
The set of possible attributes depends on the context. The lists are
slightly different in current USM and historical USM, but the user
interaction is identical.
In the Selected Sort Criteria list, the order of items also
represents the priority order for the sort process.
For each attribute of the right list, it is also possible to specify the
order the values taken by this attribute are considered (ascending
or descending order). The current direction is indicated by the
option button on the right of the attribute name. To invert this
order, click on this button. Its label then changes (Incr or Decr).
Note
92 / 182
4 Sublist Management
Note
When creating a new entry, the size of the name should not
exceed 32 characters. Authorized names are names containing
letters (case independent), numbers, and the three -,_,.
characters. Save the new entry by clicking on the Save button. If
the specified name is incorrect, the following error message
appears:
Figure 48
4.2.8
Trigger Panel
Only for current alarms, it is possible to set Tone emission or
Continuous Beep on incoming alarms in the sublist (whatever the
severity level).
Triggering capability allows ASCUR-USM to raise some external
actions. This mechanism permits to execute an external application
according to filtering conditions.
For incoming alarms, the administrator can define a selection filter
identifying alarms under scope of this automatic action.
It is also possible to trigger scripts execution as the number of
alarms contained in the sublist becomes lower or greater than
customized values.
93 / 182
4 Sublist Management
Figure 49
94 / 182
4 Sublist Management
Tone Group
Note
95 / 182
4 Sublist Management
Trigger Group
"
96 / 182
4 Sublist Management
Figure 50
97 / 182
4 Sublist Management
4.3
Deleting a Sublist
Any sublist, except the Main Alarm List and the Default Alarm
Sublist, can be deleted.
In the Counter Summary window, use the menu path:
Sublist -> Delete
The following dialog box opens (figure 51):
Figure 51
98 / 182
4 Sublist Management
4.4
Activating/Deactivating a Sublist
Activating a sublist consists in viewing the current alarms that
match the filtering criteria defined by the user. If the sublist is
opened and deactivation is asked, a dialog box opens to ask
confirmation to the user. In case of confirmation the sublist is
closed.
Note
99 / 182
4 Sublist Management
4.5
Enabling/Disabling a Counter
Enabling a counter consists in extracting the archived alarms that
match the filtering criteria defined by the user.
Note
Note
100 / 182
Historical alarms are not available with 1320 Craft Terminal. They
are only operative with Network Management.
4 Sublist Management
4.6
Figure 52
Note
101 / 182
4 Sublist Management
"
"
4.6.1
Menu Bar
The menu bar includes the following pull-down menus:
4.6.2
"
"
"
"
"
Alarm Table
This table presents the alarms matching the sublist filter. The
columns of the table correspond to the displayed subset of alarm
attributes, which has been defined as one of the sublist
parameters.
Table 2 synthesizes the actions you can undertake by using the
mouse.
Note
102 / 182
You can sort these alarms by clicking with the right button of the
mouse on the head of each columns.
4 Sublist Management
Table 2
Location
Action
Click
Double Click
Hide column
Select alarm
Single selection
Multiple selection -
Column Titles
Alarms
Unselected
(3)
(2) Drag & Drop on the bottom edge of a column title resizes the height of the
row.
(3) Drag & Drop on the bottom or high edge of the 1.st column of any rows
resizes the height of all rows.
In this Sublist window, when the user clicks with the right button of
the mouse, a contextual menu as shown in figure 53 appears.
More Info...
Correlated Alarms...
Trouble Ticket...
Acknowledge...
Reserve...
Unreserve...
Manual Purge...
Manual Clear...
Output...
External Applications
Figure 53
103 / 182
4 Sublist Management
4.6.3
Indicator Fields
The indicators display the corresponding AS IM name and the
color of the CAL Status. This color is real-time updated. Overflow
parameters are configurable (see paragraph 7.1.1).
Note
104 / 182
4 Sublist Management
4.7
Figure 54
If using directly the Exit option from the Sublist pull-down menu,
a confirmation dialog box (see figure 55) opens and ask your if
you want to save the changes you have performed on sublist
parameters.
Figure 55
105 / 182
4 Sublist Management
106 / 182
5 Alarm Management
5 Alarm Management
AS Management
Historical Alarm
Action
Action
Select
>
Reserve
Unreserve...
Trouble Ticket...
Acknowledge
Manual Purge...
Manual Clear...
Output...
Figure 56
All
None
Select
> All
None
Reserve
Unreserve...
Trouble Ticket...
Acknowledge
Manual Purge...
Manual Clear...
Output...
Save As...
Note
Historical alarms are not available with 1320 Craft Terminal. They
are only operative with Network Management.
107 / 182
5 Alarm Management
5.1
Selecting an alarm
Once an Alarm Sublist window is open, one or more alarms can
be selected, and the user has several possibilities.
5.1.1
5.1.2
"
108 / 182
5 Alarm Management
5.2
Reserving/Unreserving Alarms
To ensure to be the only responsible for an alarm (or a group of
alarms), the user can perform the reservation action on alarm(s).
5.2.1
Reserving Alarms
To reserve one or several alarms:
"
"
5.2.2
Unreserving Alarms
To unreserve one or several alarms:
"
"
109 / 182
5 Alarm Management
5.3
"
110 / 182
5 Alarm Management
5.4
Acknowledging Alarms
By acknowledging a single or a group of selected alarms in the
Alarm Sublist window, the user notifies he is taking it or them into
account.
To acknowledge one or several alarms:
"
"
A confirmation is required.
The status of the selected alarm(s) changes in the Ack. Status
column, passing from NACK (non acknowledged) to ACK
(acknowledged).
Note
111 / 182
5 Alarm Management
5.5
"
The purged alarm(s) disappear from the sublist, or main list, and
are now archived, if matching the archiving filter.
112 / 182
5 Alarm Management
5.6
"
Figure 57
Click on the Yes push button. The Report window opens (see
figure 58) showing the status of the cleared alarm(s).
113 / 182
5 Alarm Management
Figure 58
114 / 182
5 Alarm Management
5.7
"
Figure 59
Note
115 / 182
5 Alarm Management
"
"
Figure 60
116 / 182
5 Alarm Management
Note
117 / 182
5 Alarm Management
5.8
Historical alarms are not available with 1320 Craft Terminal. They
are only operative with Network Management.
The user can store into a user file a set of alarms displayed in any
of the sublists (or in the Main List). To do so, from such an Alarm
Sublist window:
"
"
The following dialog box opens (figure 61), which allows the user
to specify a file name.
Figure 61
The directory where the file will be stored has been configured by
the administrator. According to this configuration, it may be
common to the different users, to some of them, or specific to
each of them. As a result, the user cannot control this directory
location.
Simply select from the list one of the existing files to overwrite it, or
type a new name in the entry box at the bottom to create a new
file. Authorized names are names containing letters (case
independent), numbers, and the three -, _, and . characters. Size
of a name should not exceed 32 characters. Click on the Ok push
button.
118 / 182
5 Alarm Management
Figure 62
119 / 182
5 Alarm Management
120 / 182
6 Display Management
6 Display Management
To choose the way to display the alarm information from the
Counter Summary window (see chapter 3) or from the Alarm
Sublist window (see section 4.6), click on the Display pull-down
menu (see figure 63).
Display
More Info...
Correlated Alarms...
Hidden Columns
Auto-Select
Auto-Scroll
Figure 63
121 / 182
6 Display Management
6.1
"
Figure 64
Note
122 / 182
6 Display Management
6.1.1
Identity Panel
All the fields, except the User Note field of the Identity panel,
have only display purpose and are therefore read-only.
"
Figure 65
"
"
The New button allows the user to duplicate the current More
Alarm Information window. It may be useful to compare two
windows corresponding to two different alarms.
"
Note
123 / 182
6 Display Management
6.2
"
124 / 182
Note
Only alarms present in the Main Alarm List may appear in the
Correlated Alarms Sublist window.
Note
Note that when a duplicate alarm (see the Glossary for definition)
raising notification is received, alarms attributes that have
changed are updated with their most recent received value and
the repetition counter which is displayed in the Identity panel of
the More Alarm Information window of the alarm is incremented.
6 Display Management
6.3
To see all the columns, click on the horizontal scroll bar at the
bottom of the alarm table.
125 / 182
6 Display Management
6.4
Note
126 / 182
6 Display Management
6.5
127 / 182
6 Display Management
128 / 182
Option
Administration
Synchronization
Aging List
Trigger List
Figure 66
>
>
>
>
Alarm Sources
etamin0
"
"
"
129 / 182
7.1
130 / 182
7.1.1
Figure 67
131 / 182
Figure 68
"
"
132 / 182
Note
In the Halt mode, the new incoming alarms are definitively lost
until the CAL status comes back to warning.
"
Figure 69
"
The user can move one or several attributes from a list to the other
one by selecting the desired items and then using the arrow
buttons.
133 / 182
In the Selected criteria list (), the order of items represents the
order the corresponding attributes are considered in the
determination of the alarms to be kept or removed.
Note that the alarms to be removed are not the first but the last
appearing in the built list. It is possible to check the effects of the
sort by applying exactly the same criteria for displaying the
contents of the Main Alarm List. The candidates to the purge
appear at the bottom of the table.
For each attribute of the right list, the user can also specify the
order the values taken by this attribute are considered (Increasing
or Decreasing order). The current direction is indicated by the
option button on the right of the attribute name. To invert this
order, click on this button. Its label then changes (Incr or Decr).
Note
134 / 182
Statistics Area
Figure 70
"
"
135 / 182
"
Note
136 / 182
7.1.2
Note
Historical alarms are not available with 1320 Craft Terminal. They
are only operative with Network Management.
Figure 71
137 / 182
The default configuration of this filter is Match All (see figure 71).
That causes every alarm removed from the CAL to be effectively
archived (i.e. placed in the HAL).
The use of this panel is exactly the same as in the Filter panel for
the definition or modification of an Alarms Sublist (see paragraph
4.2.2).
7.1.3
Auto-Purge Panel
Automatic purging allows to automatically redirect some incoming
alarms to the HAL), avoiding their creation in the CAL.
The default configuration of this filter is Match None. That causes
every incoming alarm to enter the CAL, without any bypassing.
The use of this panel is exactly the same as in the Filter panel for
the definition or modification of an Alarms Sublist (see paragraph
4.2.2.)
Note
7.1.4
Auto-TT Panel
The access to this panel is enabled although the AS application is
not interfaced with the third party product ARS (from Remedy
Corporation). But in such a case its configuration is not
operational.
If the interface is installed, trouble ticket requests can be
automatically generated for some alarms and sent to ARS.
The default configuration of this filter is Match None. That means
that an incoming alarm never triggers the automatic creation of a
trouble ticket.
The use of this panel is exactly the same as in the Filter panel for
the definition or modification of an Alarms Sublist (see paragraph
4.2.2.).
Note
138 / 182
7.1.5
Auto-Ack Panel
Automatic acknowledgment is useful when the user wants
systematic acknowledgement of some alarms, on their incoming,
but prefers to avoid manual acknowledgement.
The default configuration of this filter is Match None, which means
that an incoming alarm is never automatically acknowledged.
The use of this panel is exactly the same as in the Filter panel for
the definition or modification of an Alarms Sublist (see paragraph
4.2.2).
Note
139 / 182
7.2
Resynchronizing AS
The Current Alarms Main List displays the alarms emitted within
the system. It is real time refreshed. An alarm received by the AS is
immediately displayed on the screen, except in the case of
automatic purging.
Furthermore, since the CAL may become inconsistent with the
actual situation of the network, the user can explicitly initiate the
resynchronization of information concerning current alarms.
To request a resynchronization with local or external agents,
(depending on the configuration file):
"
Figure 72
Figure 73
Alarms which were present in the CAL, and which are not
confirmed by the synchronization (i.e. that do not exist anymore
from the AS point of view) are automatically cleared by the AS
application. Thus, alarms that were previously acknowledged are
forwarded to the HAL, if matching the archiving filter.
140 / 182
7.3
The following window lists all the existing alarms aging (figure
74):
Figure 74
141 / 182
To manage the alarm aging from the Alarm Aging List window,
click on the Aging pull-down menu (see figure 75).
Aging
New
Delete
Activate
Deactivate
Open Aging View
Close Aging View
Close
Figure 75
142 / 182
7.3.1
7.3.2
After setting all the parameters in both panels, the user can save
them by clicking on the Save push button (on the top of the
window) and/or apply the alarm aging by clicking on the Apply
push button (at the bottom of the window).
If the user accesses the Alarm Aging Property window by the Open
Aging View menu path, the Alarm Aging Name field is already
filled out. Otherwise the user has first to enter a Name.
143 / 182
7.3.3
Definition Panel
The Definition panel describes the automatic action to be
performed on alarms (see figure 76).
Figure 76
144 / 182
"
"
"
the Every area allows the user to set the frequency of the
automatic actions.
7.3.4
Filter Panel
The Filter panel (see figure 77) allows the user to select (by
applying filtering criteria) the alarms on which these automatic
actions will be applied.
The use of the Filter panel is exactly the same as in the Sublist
Properties window (see paragraph 4.2.2).
Figure 77
145 / 182
7.3.5
Figure 78
Note
7.3.6
146 / 182
7.3.7
7.3.8
Display
Inactive Agings
Hidden columns
Auto-Raise
Figure 79
Figure 80
147 / 182
"
Navigation
Summary
>
Sublists
Report...
Archive...
External Application
Figure 81
OPEN SUBLISTS
These menus are the same in the Trigger List window menu bar.
148 / 182
7.4
The following window lists all the existing triggers (figure 82):
149 / 182
Figure 82
To manage the triggers from the Trigger List window, click on the
Trigger pull-down menu (see figure 83).
Trigger
New
Delete
Activate
Deactivate
Open Trigger View
Close Trigger View
Close
Figure 83
150 / 182
7.4.1
7.4.2
After setting all the parameters in both panels, the user can save
them by clicking on the Save push button (on the top of the
window) and/or apply the trigger by clicking on the Apply push
button (at the bottom of the window).
151 / 182
7.4.3
Definition Panel
The Definition panel describes the threshold conditions (figure 84).
Figure 84
152 / 182
153 / 182
7.4.4
Filter Panel
This panel (see figure 85) allows the user to select (by applying
filtering criteria) the alarms on which this trigger will be applied.
The use of the Filter panel is exactly the same as in the Sublist
Properties window (see paragraph 4.2.2).
Figure 85
154 / 182
7.4.5
Activate a Trigger
To activate a trigger, first select it in the list, then use the menu
path:
Trigger -> Activate
The Trigger List is updated (see figure 86):
Figure 86
Note
155 / 182
7.4.6
Deactivate a Trigger
To inactivate a trigger, select it in the Trigger List window, then use
the menu path:
Trigger -> Deactivate
The status of the trigger will be Deactivated in the Trigger List
window (see figure 87).
Figure 87
7.4.7
Delete a Trigger
To delete a trigger, select it in the Trigger List window, then use the
menu path:
Trigger -> Delete
The selected trigger will disappear from the Trigger List window.
156 / 182
"
"
"
"
157 / 182
Figure 88
158 / 182
8.1
Note
159 / 182
Figure 89
160 / 182
Figure 90
"
"
"
161 / 182
Figure 91
Click on the Yes push button to go on. The sublists are closed,
if previously open, and made empty, but their characteristics
(especially the related filter) are kept. To regenerate their
content, just open them again.
"
Clicking on the Yes push button initiates the retrieval from the
selected source. The user will continuously be informed of the
progress of the retrieval operation by the updated counters of the
Counter Summary window and by the following Filling Percentage
window (see figure 92):
162 / 182
Figure 92
Figure 93
163 / 182
8.2
Figure 94
one (Excluded User Files) for the user files not to be used for
retrieval
the other one (Included User Files) for the user files to be
used for the retrieval
The user can move one or several attributes from a list to the other
one, by selecting the desired items then using the arrow buttons.
Click on the Ok push button to enter the retrieval process itself, as
described in section 8.1, with first the definition of the filter to be
used.
164 / 182
8.3
The same dialog box as above opens (see figure 94). Operate in
the same way.
Click on Ok to actually delete the chosen files.
165 / 182
166 / 182
9 Navigation Features
9 Navigation Features
AS provides some navigation features in order to improve the
handling of the application.
To choose the destination from the Counter Summary window (see
chapter 3), or from any Alarm Sublist window (see section 4.6),
click on the Navigation pull-down menu (see figure 95):
Navigation
Summary
>
Sublists
Report...
Current...
Archive...
PNM...
External Application
Figure 95
OPEN SUBLISTS
MAIN ALARM LIST
Ne_Nantes
167 / 182
9 Navigation Features
9.1
168 / 182
9 Navigation Features
9.2
Note that only currently open sublists (for the considered subset current or historical alarms - of the application) are presented in
this dynamic menu, and not the whole set of existing sublists.
This menu also does not include (in current alarms management
case) the Alarm Sublist windows obtained through the Correlated
Alarms command (see section 6.2).
To access sublist that are not currently open, first select the Open
option from the Sublist pull-down menu (see section 4.6).
169 / 182
9 Navigation Features
9.3
Figure 96
Report Window
170 / 182
a menu bar
a Report List
a Report Detail area
9 Navigation Features
Menu Bar
The menu bar includes the following pull-down menus (see figure
97).
Report
Report
Delete...
Clear
Close
Figure 97
Display
Display
All Attributes
AutoRaise
171 / 182
9 Navigation Features
Date & Time: date and time the action was sent
Source: source the alarm is coming from
Type: type of the performed action. The different types are as
follows:
D
D
D
D
D
D
D
D
D
D
D
D
D
D
D
D
D
D
D
"
172 / 182
9 Navigation Features
Note
Note
173 / 182
9 Navigation Features
9.3.1
Deleting a Report
The user can delete reports for some selected actions.
Clearing the whole report window, as presented in the next
paragraph, may be sometimes an inadequate solution, so the user
can also delete a single or some report items after having selected
them. The reports must correspond to terminated actions.
To delete some report items:
"
"
9.3.2
9.3.3
174 / 182
"
"
9 Navigation Features
9.4
Note
If the Alarm List the user wants to navigate to is not running, the
result of the request is the starting up of this part. If it is running, it
is brought on top.
175 / 182
9 Navigation Features
9.5
"
176 / 182
10
Terminology
10 Terminology
10.1
Abbreviations
ALMAP
ARS
AS
Alarm Surveillance
CAL
CNE
Composite NE
ELM
FDN
GUI
HAL
HMI
MOC
MOI
NE
Network Element
OVW
PNM
TMN
TN
Telecommunications Network
TT
Trouble Ticket
TVA
177 / 182
10
Terminology
10.2
Glossary
Acknowledgement
When an alarm is taken into account by the application, the user
has to acknowledge it to point out that he has seen it and that he
will react in the right way.
Acknowledgement status
This attribute indicates whether the reported alarm has been
acknowledged or not.
Additional information
Optional attribute of an alarm wich consists in structured
information that is used to define sublists characteristics.
Additional text
This optional information allows a free form text description to be
reported.
Alarm
An alerting indication to a condition that may have an immediate
or potentially negative impact on the state of a communication
resource. An alarm is characterized by an alarm begin and an
alarm end.
Archiving filter
Alarms which are removed from the CAL (whatever the reason)
are tested against this filter. If matching it, they are archived in the
Historical Alarms List (HAL) and they can be retrieved from it using
the AS historical part commands and operations.
Clearable
The alarm status is clearable if it can be cleared by the operator.
Clearing status
This attribute indicates whether the reported alarm has been
cleared or not.
Correlated notification
This optional attribute indicates a link of an alarm to a set of other
alarms identified by a Notification Identifier and their relative
Object instance.
Correlated Notification Flag (in the CAL only)
This attribute is set to YES when a Correlated Notification is sent
together with the reported alarm.
Event date & time
This parameter gives the local date and time when the alarm
notification has been detected.
178 / 182
10
Terminology
Event type
This parameter categories the alarm.
Expiration status
This attribute take the value notExpired when the alarm arises.
After a certain date or conditions defined by the Alarm Aging
machanism (present, (not)cleared or (not)acknowledged since a
given time, it takes a corresponding combination among the
following set of values: present-, acknowledge-,
notAcknowledge-, clear- or notClearExpired.
Filter
They are related to the alarms or events generated on an NE.
They can be configured by a user to reject specified types of
notifications and limit the processing that is applied to them.
Friendly name
Name of a managed entity.
Human Machine Interface
It is the graphical user interface application through which the
users interact with the system.
Insertion Cause (in the HAL only)
This parameter indicates which processing causes the alarm to be
archived. It can be one of the following:
"
"
"
"
"
"
"
Overflow purge
Manual purge
Automatic purge
Acknowledging a cleared alarm (or the inverse)
Synchronization
AS IM Modification
Invalidation
179 / 182
10
Terminology
"
"
"
"
"
"
"
"
"
"
180 / 182
10
Terminology
Perceived severity
This parameter defines six severity levels, which provide an
indication of how it is perceived that the capability of the managed
object has been affected.
Probable cause
This parameter defines further qualification as to the probable
cause of the alarm.
Proposed repair actions
This optional attribute consists of a set of elements, each indicating
a possible solution for solving the present alarm.
Repetition counter
This parameter indicates the number of times an alarm was sent
by an agent.
Reservation status
This attribute indicates whether the alarm has been reserved by a
user or not.
Severity
See Perceived Severity.
Specific problems
This optional attribute consists of a set of possible values
complementary to the probable cause.
State change definition
This optional attribute is used to indicate a state transition
associated with the alarm.
Telecommunication Network
Describes the network to be managed. Provides the transmission,
the transport and the switching supports to the interconnected
Network Elements.
Threshold information
This optional attribute indicates information relative to the crossing
of a threshold that implied the emission of the alarm.
Trend indication
This optional information specifies the current severity trend of the
managed object. The following values can be taken by this
attribute:
"
"
181 / 182
10
Terminology
"
Less severe: this alarm has not the highest severity of the set
of alarm impacting the same object instance.
Wrapping
Wrapping is the technique that enables the most recent entries in
a file to replace the oldest when a file is full.
END OF DOCUMENT
182 / 182